Last month, KrebsOnSecurity identified U.K. citizen Daniel Kaye as the likely real-life identity behind a hacker responsible for clumsily wielding a powerful botnet built on Mirai, a malware strain that enslaves poorly secured Internet of Things (IoT) devices for use in large-scale online attacks. Today, a German court issued a suspended sentence for Kaye, who now faces related cybercrime charges in the United Kingdom.
Month: July 2017
As we approach the first anniversary of the ShadowBrokers, their true identity and source of their stolen NSA exploits remains a mystery.
Your daily round-up of some of the other stories in the news
A ransomware study released Google revealed the malware earned criminals $25 million over the past two years.
Medical devices have been a focus of concern – but a network of independent labs will work with manufacturers and health providers to improve their security health
The e-discovery process during litigation is a challenge to make sure that all the data is properly handled and disclosed, as Wells Fargo has learned
San Francisco company Kite ‘wants to do better’ after users object to its changes to Minimap for Atom
Skimming devices that crooks install inside fuel station gas pumps frequently rely on an embedded Bluetooth component allowing thieves to collect stolen credit card data from the pumps wirelessly with any mobile device. The downside of this approach is that Bluetooth-based skimmers can be detected by anyone else with a mobile device. Now, investigators in the New York say they are starting to see pump skimmers that use cannibalized cell phone components to send stolen card data via text message.